Security Risk, Strategy & Governance - Templates & Policies

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Data Privacy Program Report

This template outlines the operations of your organization's data privacy program by presenting specific metrics across all twelve areas of data privacy, in a digestible...

CISO Diary

Use Info-Tech's CISO Diary to access stakeholder interview questions and to record and summarize your stakeholder interviews.

Introduction Sheet

Use Info-Tech's Introduction Sheet to create a short communication memo to send to your colleagues on your first day.

The First 100 Days as CISO Executive Presentation Example

Use the Executive Presentation Example as a reference to building out The First 100 Days as CISO Executive Presentation Template.

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

Data Security Executive Report

Focus on the key metrics your senior leadership team wants to see. Use this executive report template to show how the organization's high-risk data is being secured.

Security Cost Optimization Executive Presentation

Use this template to help communicate your cost optimization action plan.

Digital Risk Management Executive Report

Build the business case for effective digital risk management to drive successful digital transformation. This executive presentation outlines the core components of the...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us